scan2payme Security & Risk Analysis

wordpress.org/plugins/scan2payme

Plugin for displaying payment QR-Codes in WooCommerce order pages.

0 active installs v1.0.4 PHP 8.0+ WP 6.4+ Updated Dec 17, 2024
bank-transfergirocodepaymentqr-codewoocommerce
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is scan2payme Safe to Use in 2026?

Generally Safe

Score 92/100

scan2payme has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The "scan2payme" plugin, in version 1.0.4, exhibits a mixed security posture. On the positive side, the plugin demonstrates excellent coding practices in several areas. All SQL queries are properly prepared, and all output is correctly escaped, indicating a strong defense against common injection and XSS vulnerabilities. There are no file operations or external HTTP requests, further reducing the attack surface. The absence of bundled libraries is also a good sign, as it avoids potential vulnerabilities from outdated dependencies.

However, a significant concern arises from the attack surface analysis. The plugin has a single entry point through an AJAX handler that completely lacks authentication checks. This presents a critical risk, as any unauthenticated user could potentially interact with this handler, leading to unintended actions or information disclosure. While taint analysis did not reveal any issues, the presence of an unprotected AJAX endpoint bypasses the need for taint to manifest a vulnerability, as the lack of authorization is the primary flaw.

Furthermore, the plugin's vulnerability history is entirely clean, with no recorded CVEs. While this is a positive indicator, it's important to note that a clean history does not guarantee future security. Coupled with the unprotected AJAX endpoint, this suggests that while the developers may have good intentions, there's a critical oversight in securing critical functionalities. The plugin's strengths in preventing common web vulnerabilities are overshadowed by the single, yet significant, vulnerability in its authentication mechanism.

Key Concerns

  • AJAX handler without authentication
Vulnerabilities
None known

scan2payme Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

scan2payme Release Timeline

v1.0.5
v1.0.4Current
v1.0.3
v1.0.2
Code Analysis
Analyzed Mar 17, 2026

scan2payme Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
42 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped42 total outputs
Attack Surface
1 unprotected

scan2payme Attack Surface

Entry Points1
Unprotected1

AJAX Handlers 1

authwp_ajax_scan2payme_option_account_changedscan2payme-admin.php:50
WordPress Hooks 4
actionadmin_menuscan2payme-admin.php:17
actionadmin_enqueue_scriptsscan2payme-admin.php:22
actionadmin_initscan2payme-admin.php:390
actionplugins_loadedscan2payme.php:67
Maintenance & Trust

scan2payme Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedDec 17, 2024
PHP min version8.0
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

scan2payme Developer Profile

awaldherr

1 plugin · 0 total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect scan2payme

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/scan2payme/js/scan2payme-admin.js
Version Parameters
scan2payme/js/scan2payme-admin.js?ver=

HTML / DOM Fingerprints

HTML Comments
<!-- TODO does the default value work if this is a fresh installation? -->
Data Attributes
data-nonce="scan2payme-account-nonce"
JS Globals
scan2payme_ajax_object
REST Endpoints
/wp-json/scan2payme/v1/options
FAQ

Frequently Asked Questions about scan2payme